1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
12

Consider the following partial class definitions: public class A1 { public int x; private int y; protected int z; ... } public c

lass A2 extends A1 { protected int a; private int b; ... } public class A3 extends A2 { private int q; ... } Which of the following is true regarding the use of instance data y of class A1?
Computers and Technology
1 answer:
kaheart [24]3 years ago
6 0

Answer:

The answer to the given question is "It's only accessible in A1".  

Explanation:

  • In the given class definition question there are three classes defines that are A1, A2, and A3 and all the class uses the public access modifier that means it is access able every where in the program.  
  • In class A1 we define a three-variable that is "x, y, and z" in which variable x is used public access modifier, variable y is used private access modifier, and variable z is use protected access modifier.
  • The public access modifier is access able every wherein the program and the protected access modifier is access able in the same class and the class which inherits it. but the private access modifier can not be access able outside the class.

That's why the answer "It's only accessible in A1" is correct.    

You might be interested in
What are the three major functions of a game engine?
Harrizon [31]
read that hope this helped

8 0
3 years ago
A store sells rope only in whole-foot increments. Given three lengths of rope, in feet, the following code segment is intended t
Lynna [10]

Answer:

The answer is "option B".

Explanation:

In the given code, four double variable "len1, len2, len3, and total" is declared, in which the first three variables accept some value, and in the total variable, we add those variable. In the next step, an integer variable minLength is defined, which converts the decimal value to an integer and adds the value that is "0.5". In this section, the code uses as an intended purpose but only if the total of 3 lengths is equivalent to or larger then 0.5, and wrong choices can be described as follows:

  • In option A, It accepts the negative value, that's why it is wrong.
  • Option C, Option D, and Option E all were wrong because the code segment is work as intended.
5 0
2 years ago
Montoya Consumer Products Inc is implementing Service Cloud. They typically handle 50,000 customer inquiries per day. What shoul
maksim [4K]

Answer:

Option A is correct

Explanation:

It would help in building the right architecture and configuration that would decrease those operations times by a large magnitude like uploading or updating large number of records.

8 0
3 years ago
Write an application that uses String method region-Matches to compare two stringsinput by the user. The application should inpu
SOVA2 [1]

Answer:

Explanation:

The following program creates a function called region_Matches that takes in two strings as arguments as well as an int for starting point and an int for amount of characters to compare. Then it compares those characters in each of the words. If they match (ignoring case) then the function outputs True, else it ouputs False. The test cases compare the words "moving" and "loving", the first test case compares the words starting at point 0 which outputs false because m and l are different. Test case 2 ouputs True since it starts at point 1 which is o and o.

class Brainly {

   public static void main(String[] args) {

       String word1 = "moving";

       String word2 = "loving";

       boolean result = region_Matches(word1, word2, 0, 4);

       boolean result2 = region_Matches(word1, word2, 1, 4);

       System.out.println(result);

       System.out.println(result2);

   }

   public static boolean region_Matches(String word1, String word2, int start, int numberOfChars) {

       boolean same = true;

       for (int x = 0; x < numberOfChars; x++) {

           if (Character.toLowerCase(word1.charAt(start + x)) == Character.toLowerCase(word2.charAt(start + x))) {

               continue;

           } else {

               same = false;

               break;

           }

       }

       return same;

   }

}

3 0
2 years ago
Explain the security mechanisms available for a database and how the data will be protected.
Stolb23 [73]

Answer: Views, unauthorized access, encryption are some of the security mechanisms.

Explanation:

The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and  object privileges, whereby with system privileges one can change the system environment variables.

8 0
3 years ago
Other questions:
  • (I'LL GIVE BRAINLIST)
    10·2 answers
  • which virtue you need to secure information by limiting computer access to authorized personnel only?
    10·1 answer
  • What are the data types used in C programming with examples
    5·1 answer
  • QUESTION
    10·1 answer
  • PLEASE HELP ANSWER THIS only if you know BOTH ANSWERS!
    9·2 answers
  • You want to substitute one word with another throughout your document. What tool(s) should you use?
    9·1 answer
  • Which of the following is true of the poka-yoke approach used for mistake-proofing processes?
    9·2 answers
  • Tradegy deals with _____
    14·1 answer
  • Which statistical measurement tools should be
    8·1 answer
  • What Does The Computer Monitor Contain?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!